AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis
暂无分享,去创建一个
[1] Stjepan Picek,et al. Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis , 2022, IACR Cryptol. ePrint Arch..
[2] Shengyi Huang,et al. A Closer Look at Invalid Action Masking in Policy Gradient Algorithms , 2020, FLAIRS.
[3] Paul Ampadu,et al. SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher , 2020, ArXiv.
[4] E. Prouff,et al. Deep learning for side-channel analysis and introduction to ASCAD database , 2019, Journal of Cryptographic Engineering.
[5] Lejla Batina,et al. A Systematic Evaluation of Profiling Through Focused Feature Selection , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[6] Debdeep Mukhopadhyay,et al. CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis , 2019, IEEE Transactions on Computers.
[7] Annelie Heuser,et al. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..
[8] Alec Radford,et al. Proximal Policy Optimization Algorithms , 2017, ArXiv.
[9] Emmanuel Prouff,et al. Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.
[10] Máire O'Neill,et al. Neural network based attack on a masked implementation of AES , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[11] Romain Poussier,et al. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) , 2015, COSADE.
[12] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[13] Michael I. Jordan,et al. Trust Region Policy Optimization , 2015, ICML.
[14] Markus G. Kuhn,et al. Efficient Template Attacks , 2013, CARDIS.
[15] Joos Vandewalle,et al. Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.
[16] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[17] Emmanuel Prouff,et al. A Generic Method for Secure SBox Implementation , 2007, WISA.
[18] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[19] Christof Paar,et al. Templates vs. Stochastic Methods , 2006, CHES.
[20] Eric Peeters,et al. Template Attacks in Principal Subspaces , 2006, CHES.
[21] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[22] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[23] Yishay Mansour,et al. Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.
[24] Huaiyu Zhu. On Information and Sufficiency , 1997 .
[25] Ronald J. Williams,et al. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.
[26] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[27] Stjepan Picek,et al. Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis , 2021, IACR Cryptol. ePrint Arch..
[28] Stjepan Picek,et al. The Best of Two Worlds: Deep Learning-assisted Template Attack , 2021, IACR Cryptol. ePrint Arch..
[29] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[30] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[31] Christian R. Shelton,et al. Importance sampling for reinforcement learning with multiple objectives , 2001 .
[32] Long-Ji Lin,et al. Reinforcement learning for robots using neural networks , 1992 .
[33] H. Hotelling. Analysis of a complex of statistical variables into principal components. , 1933 .